This Set of Multiple Choice SAN Storage Questions and Answers Focuses On Storage Virtualization
This Set of Multiple Choice SAN Storage Questions and Answers Focuses On Storage Virtualization
This Set of Multiple Choice SAN Storage Questions and Answers Focuses On Storage Virtualization
This set of multiple choice SAN storage questions and answers focuses on Storage Virtualization.
1. Which of the following company manufactures Raid arrays
a) Hyundai
b) Honda
c) Hitachi
d) Mitsubishi
View Answer
Answer: c
2. An FC jammer-analyzer can be used to
a) Capture all FC frames
b) Tamper FC packets
c) I/O performance
d) All of the mentioned
View Answer
Answer: d
3. Network level virtualization in a SAN fabric can be implemented by having virtualization engine
running in
a) HBA
b) FC switch
c) Raid array
d) Any of the mentioned
View Answer
Answer: b
4. VTL emulates
a) Library and Tape drive
b) Library and Disk driver
c) Virtual Tape only
d) Any of the mentioned
View Answer
Answer: a
5. Which of the following company manufacture San Fabric switches
a) Emulex
b) Cisco
c) JNI
d) All of the mentioned
View Answer
Answer: b
1. Bathtub Curve is used to represent the reliability characteristics of hardware components. Why is this
not applicable to software modules?
a) Software failures tends to stabilize and do not increase with respect to time
b) Software failures cannot be predicted
c) Hardware components do not fail for a long time
d) Software fails more compared to hardware
View Answer
Answer: a
2. Which one of the below is measured by MTBF?
a) Tolerance
b) Life time
c) Reliability
d) Quality
View Answer
Answer: c
3. In designing a fault-tolerant system which one of the methods is appropriate?
a) Fail Safe
b) Fail Fast
c) Multi-Fail
d) Fail Rare
View Answer
Answer: b
4. A system has MTBF of 100,000 hours and MTTR of 30 minutes. What is the average down time of the
system in one year?
a) 2.6 minutes
b) 1.8 minutes
c) 18 minutes
d) 30 minutes
View Answer
Answer: a
5. What is the most common redundancy configuration for HA?
a) N+1
b) N+M
c) 2N
d) 5N
View Answer
Answer: a
6. One of the common problems seen in a cluster configuration has a name which contains the most
complex part of human body.
a) Split-brain
b) Cluster
c) Multi-Brain
d) Heart Beat
View Answer
Answer: a
7. Which one of the following is a cluster, based on shared nothing model?
a) MSCC NT4
b) Netware CS
c) Unixware 7
d) Linux-HA
View Answer
Answer: a
8. The MTBF of system should be high for fault tolerant systems with
a) Single Point Failure
b) Multi Point Tolerant
c) Single Point Tolerant
d) Multi-Tolerant
View Answer
Answer: a
9. Which one of the following is NOT a Single System Image Clustering Solution?
a) Open VMS
b) HP-TruCluster
c) OpenSSI
d) NovelNetware
View Answer
Answer: d
10. Which one is a common software fault tolerant model for safety critical jobs such as flight control
software?
a) Active-Active config.
b) Active-Backup config
c) N-Version Programming
d) Failover
View Answer
Answer: c
1. Data protection is required to recover from
a) Disk/System failures
b) Software corruption through virus
c) Human errors
d) All of the mentioned
View Answer
Answer: d
2. The challenges for data protection are
a) Taking care of the old data
b) Backing up the dynamic data
c) All of the mentioned
View Answer
Answer: b
3. Name the mechanism which provides the highest level of data protection
a) RAID 0
b) RAID 1
c) RAID 6
d) All of the mentioned
View Answer
Answer: c
4. Which statements are true w.r.t SMART disks
a) Detect and correct the errors that occur because of failure
b) Monitors the disk at regular intervals
c) Provides information on the disk failures in advance
d) a and b
e) b and c
View Answer
Answer: e
5. The drawback of data mirroring is
a) Backing up the data
b) Performance degradation
c) Difficulty involved in configuring the mirrored volume
d) All of the mentioned
View Answer
Answer: b
6. With reference to Volume Manager, is the following statement TRUE or FALSE under specific
configuration?
– Volume manager provides protection against multiple disk failures
a) True
b) False
View Answer
Answer: a
7. Which are all the statements valid statements w.r.t volume manager
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
View Answer
Answer: d
8. Point out the false statement. Volume can
a) Span across different partitions/disks
b) Span across different disk arrays
c) Be created on tape device
d) Be a shared volume
View Answer
Answer: c
9. Identify the correct statements w.r.t. Journal File System (JFS)
a) JFS keeps pointers to all the stale data
b) While recovering data on a system, JFS helps in quicker recovery
c) All of the mentioned
View Answer
Answer: b
10. In a clustered volume manager scenario, identify the incorrect statement
a) All the nodes in the system will have access to shared volumes
b) Only a set of nodes will have access to shared volumes
c) All the nodes will be allowed to write data to the shared volume
d) All of the mentioned
View Answer
Answer: b
This set of SAN multiple choice questions and answers focuses on Snapshot Technology.
1. Which of the following statement is false?
a) In synchronous mirroring, write acknowledgement is sent once both the mirrors are written
b) In synchronous mirroring, write response time can be slow as it depends on the slowest disk of the
mirror
c) Write response to an application is faster for asynchronous mirroring as compared to synchronous
mirroring
d) None of the mentioned
View Answer
Answer: d
2. Which of the following statement is false for snapshots?
a) Snapshot technique can use copy-on-write mechanism
b) Uses point-in-time to ensure data integrity
c) Snapshot copy must be on a different device
d) None of the mentioned
View Answer
Answer: c
3. Which of the following is true for CDP – Continuous Data Protection?
a) It backs up every change to the data
b) Can restore to any time in the past
c) Both the mentioned
d) None of the mentioned
View Answer
Answer: b
4. Which of the following is false for D2D2T – Disk to Disk to Tape backup?
a) Backup and Restore is faster
b) Tape is used for archiving and/or long term storage
c) Cheaper disks are generally used for backup device
d) None of the mentioned
View Answer
Answer: d
5. Which of the following is false for NDMP protocol?
a) NDMP uses TCP/IP
b) NDMP allows selective file recovery
c) NDMP allows asynchronous event notification
d) None of the mentioned
View Answer
Answer: d
6. The serverless backup technology mainly depends on
a) Copy command
b) Extended copy command
c) Read/write command
d) None of the mentioned
View Answer
Answer: b
7. Snapshot provides a mechanism to take backup of
a) Static data
b) Deleted data
c) Dynamic data
d) None of the mentioned
View Answer
Answer: c
8. Snapshot provides information on
a) The latest data on the volume
b) The old data on the volume
c) The data present on the volume at specified time
d) None of the mentioned
View Answer
Answer: c
9. The CDP is mainly based on
a) XCOPY command
b) Data mirroring
c) Snapshot mechanism
d) None of the mentioned
View Answer
Answer: c
10. Which snapshot technique is space efficient?
a) Split-Mirror
b) Copy-on-Write
c) None of the mentioned
View Answer
Answer: b
This set of multiple choice SAN storage questions and answers focuses on Filesystems.
1. An “Inode” represents
a) Buffer
b) Data
c) Files & Directories
d) None of the mentioned
View Answer
Answer: c
2. Journaling is preferred for
a) Faster file system recovery
b) Faster write operation
c) Storing logs
d) Storing metadata
View Answer
Answer: a
3. Examples of Journaling filesystem
a) Ext2
b) Ext3
c) UFS
d) JFS
View Answer
Answer: b
4. Hard links & soft links are same
a) TRUE
b) FALSE
View Answer
Answer: b
5. ACL stands for
a) ACCESS control list
b) ACCESS check list
c) Audit control list
d) Audit check list
View Answer
Answer: a
6. VFS
a) Standalone filesystem
b) Support multiple filesystem type
c) Network filesystem
d) None of the mentioned
View Answer
Answer: b
7. Buffer cache helps to
a) Store data
b) Improved read/write performance
c) Allocate memory
d) None of the mentioned
View Answer
Answer: b
8. Wear leveling affects
a) Hard disk
b) Flash
c) Optical storage
d) RAM
View Answer
Answer: b
9. Deframentation is the process of
a) physically reorganizing the contents of the disk to store the pieces of each file close together and
contiguously
b) Create extra space in filesystem
c) Resizing the filesystem
d) None of the mentioned
View Answer
Answer: a
10. The Superblock is required for
a) Description of the basic size and shape of this file system
b) This is the inode number of the first inode in the file system
c) The number of free blocks in the file system
d) All of the mentioned
View Answer
Answer: d
1. Which is the most common cause of soft errors in hardware?
a) Thermal Issue
b) Cosmic Rays
c) Alpha Particile
d) Voltage Fluctuation
View Answer
Answer: b
2. If X is the MTBF of a system and Y is the failure rate of the system then which one is true?
a) X * Y = 1
b) X = Y
c) NX = Y, where N is the life time
d) X/Y = N, where N is the life time
View Answer
Answer: a
3. Which one of the property is NOT a requirement for Fault Tolerance?
a) Fault Containments
b) Fault Isolation
c) Dynamic Recovery
d) Fail Safe
View Answer
Answer: d
4. Which of the operating system architecture is suitable for FT based systems?
a) A – Monolithic Kernel
b) B – Micro Kernel
c) C – Real Time Kernel
d) D – All of the mentioned
View Answer
Answer: b
5. The common mechanism used to find latent failure in memory modules:
a) Sniffing
b) Scrubbing
c) Swapping
d) Paging
View Answer
Answer: a
6. Which one of the availability criteria is optimal for carrier grade class systems?
a) 40 seconds of down time per year
b) 40 minutes of down time per year
c) 10 minutes of down time per year
d) 10 seconds of down time per year
View Answer
Answer: a
7. MTTR is the best way to characterize
a) Availability
b) Reliability
c) Fault Tolerance
d) Dependability
View Answer
Answer: a
1. Which of the following suffers from write hole problem?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAIDZ
View Answer
Answer: c
2. If read and write performance is the only criterion, which would you choose?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 50
e) JBOD
View Answer
Answer: a
3. Which one of the following is an invalid RAID level?
a) Raid 10
b) Raid 50
c) Raid 53
d) Raid 80
View Answer
Answer: d
4. Which of the following RAID levels guarantees double disk failure protection?
a) Raid 5
b) Raid 6
c) Raid 0+1
d) Raid 1+0
View Answer
Answer: b, c, d
5. Which of the following RAID levels are nested?
a) Raid 5
b) Raid 6
b) Raid 10
c) Raid 50
View Answer
Answer: b, c
6. What is the name of raid module in a linux kernel?
a) lvm
b) raidsoft
c) md
d) none of the mentioned
View Answer
Answer: c
7. What is the minimum number of disks needed for Raid level 5?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
8. When one disk fails in a RAID 5 array with a hot spare, which one of the following statements is true?
a) No IO can continue
b) Reads continue from hot spare, but writes fail
c) Both reads and writes can continue
d) Array must be shut down immediately for replacing the failed disk
View Answer
Answer: c
9. When one disk fails in a RAID 5 array without a hot spare, which one of the following statements is
true:
a) No IO can continue
b) Reads continue from hot spare, but writes fail
c) Both reads and writes can continue
d) Array must be shut down immediately for replacing the failed disk
View Answer
Answer: c
1. Which two are advantages of hardware RAID controllers?
a) Volume management is performed by the server
b) Volume management is performed by controller card
c) Dedicated cache memory increases server write performance
d) Parity calculation by the server and cache memory in the RAID controller increases read and write
performance
View Answer
Answer: b, c
2. Which two RAID types use parity for data protection?
a) RAID 1
b) RAID 4
c) RAID 1+ 0
d) RAID 5
View Answer
Answer: b, d
3. Which one of these is characteristic of RAID 5?
a) Distributed parity
b) No Parity
c) All parity in a single disk
d) Double Parity
View Answer
Answer: a
4. What is the unique characteristic of RAID 6 (Choose one)?
a) Distributed Parity
b) Striping
c) Two independent distributed parity
d) Mirroring
View Answer
Answer: c
5. Which of the following combinations can support RAID 05?
a) 2 sets with 3 disks each
b) 3 sets with 2 disks each
c) 4 sets with 3 disks each
d) 4 sets with 1 disk each
View Answer
Answer: b, c
6. What is the minimum number of disks required for RAID1?
a) 1
b) 2
c) 4
d) 5
View Answer
Answer: b
7. Which of the following raid levels provides maximum usable disk space?
a) RAID 1
b) RAID 0
c) RAID 5
d) RAID 6
View Answer
Answer: b
8. Can you help decide on the RAID level to use – we are a media house and we use lot of graphics/video
applications – we need large throughputs for videos to get played without any jitter and since we are in
publishing business we can’t afford downtimes.
Even if there is any downtime we would like our data to be quickly reconstructed and enable us to
continue with out work in less time
a) Raid 5
b) Raid 10
c) Raid 6
d) Raid 01
e) Raid 0
View Answer
Answer: b
9. The mean time to failure of a single disk is 200000 hrs. If an array of disks is using 5 such disks, the
mttf of the array is
a) 200000 hrs
b) 40000 hrs
c) 1000000 hrs
d) Can not be determined
View Answer
Answer: b
10. An array of disks is more likely to fail compared to a single disk. How is it that RAID arrays still
manage to provide more data protection compared to a single disk?
a) Using either mirroring or striping
b) Using either mirroring or parity
c) Using better quality disks
d) Using dedicated hardware
View Answer
Answer: b
1. Which of the following is false regarding multiple paths?
a) Load balancing can be done
b) Higher throughput can be achieved
c) Path Failover can be done
d) None of the mentioned
View Answer
Answer: d
2. Which of the following is invalid error recovery level?
a) Session level recovery
b) SCSI level recovery
c) Connection level recovery
d) Digest failure recovery
View Answer
Answer: b
3. Which of the following statement is true?
a) iSCSI can be implemented in software
b) iSCSI can be implemented in hardware
c) System can boot from iSCSI disk over network
d) All of the mentioned
View Answer
Answer: d
4. Which of the following statement is false?
a) iSCSI is limited to local LAN
b) iSCSI can run both on 1GB and 10GB networks
c) iSCSI requires Fibre Channel HBA on the host
d) iSCSI requires network card on the host
View Answer
Answer: a , c
5. Which of the following companies have iSCSI products?
a) Equallogic
b) Qlogic
c) EMC
d) All of the mentioned
View Answer
Answer: d
1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned
View Answer
Answer: a
2. iSCSI allows what type of access
a) block level
b) file level
c) both a & b
d) none of the mentioned
View Answer
Answer: a
3. iSCSI names are:
a) Globally unique
b) Local to the setup
c) permanent
d) temporary
View Answer
Answer: a , c
4.Which of the following is not true of iSCSI names?
a) iSCSI names are associated with iSCSI nodes(targets and initiators.
b) iSCSI names are associated with n/w adapter cards
c) iSCSI names are world wide unique.
d) iSCSI names are permanant.
View Answer
Answer: b
5. Which of the following is not a valid iSCSI name?
a) iqn.2001-04.com.mystorage:storage.tape1
b) iqn.2001-04.com.mystorage
c) iqn.01-04.com.example.disk
d) none of the mentioned.
View Answer
Answer: c
6. Which of the following is not a valid iSCSI name?
a) eui.1234098769785341
b) eui.4237098769785341
c) eui.12340987697853422.disk
d) none of the mentioned
View Answer
Answer: c
7. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses.
b) Probing Luns on iSCSI targets.
c) Either of above
d) None of the mentioned
View Answer
Answer: a
8. Which of the following are valid SendTargets commands?
a) SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b) SendTargets=all
c) Both a. and b.
d) None of the mentioned
View Answer
Answer: c
9. iSCSI targets can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned
View Answer
Answer: d
10. Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned
View Answer
Answer: d
1. Which of the following protocol can have maximum device connected?
a) SATA
b) SAS
c) FC-AL
d) ATA
View Answer
2. SAS port identifier is:
a) 8 bit
b) 16 bit
c) 32 bit
d) 64 bit
View Answer
Answer: d
3. SAS inherited the multi-channel concept from?
a) iSCSI
b) Fibre Channel
c) Infinband
d) IDE
View Answer
Answer: c
4. Which of the following is false?
a) a connection is a temporary association
b) a connection is a permanent association
c) SAS port shares different namespace than FC port
d) a pathway is a set of physical link used by a connection
View Answer
Answer: b, c
5. Which of the following is not a transport layer protocol in a SAS port?
a) SMP
b) STP
c) SIP
d) SSP
View Answer
Answer: c
1. What is SAS?
a) Serial Attached SCSI
b) Storage Attached SCSI
c) Serial Advanced SCSI
d) SAS is not SCSI
View Answer
Answer: a
2. Which of the following is true?
a) SAS is compatible with SATA physical layer
b) SAS is not parallel SCSI
c) SAS has multiple channels per port
d) All of the mentioned
View Answer
Answer: d
3. SAS Domain can have:
a) 16256 devices in a single domain
b) 128 expanders per domain
c) 128 phys per expander
d) All of the mentioned
View Answer
Answer: d
4. Which of the following is false?
a) SAS and SATA devices can’t be connected in the same system
b) SAS is a point to point protocol
c) Expanders are used to connect to multiple devices
d) None of the mentioned
View Answer
Answer: a
5. Which of the following is false?
a) SAS devices can have narrow ports and/or wide ports
b) Expander port is a type of SAS port
c) Each SAS port has a SAS address
d) None of the mentioned
View Answer
Answer: b
6. Which of the following is false?
a) SAS disk device with two phys can be a wide port
b) Expander device is not a SAS device
c) HBA having multiple ports can be configured to have wide and narrow ports
d) None of the mentioned
View Answer
Answer: a
7. Which of the following is true for Expander device?
a) Expander device has a SAS address
b) Has expander ports
c) May contain SAS device
d) All of the mentioned
View Answer
Answer: d
8. Which of the following is false?
a) Expander device has optional SMP initiator port
b) Expander device has optional SMP target port
c) Expander port can connect to SAS target device
d) Expander port can connect to another expander device
View Answer
Answer: b
9. Which of the following layer is present in a SAS port?
a) Transport layer
b) Phy layer
c) Port layer
d) All of the mentioned
View Answer
10. Which of the following protocol has slowest speed?
a) SATA
b) SAS
c) FC-AL
d) All of the mentioned
View Answer
Answer: a
1. What is the maximum number of loop ports that can participate in an arbitrated?
a) 128
b) 127
c) 256
d) 0
View Answer
Answer: b
2. In a fabric topology what is the discovery process that allocates fabric address to the participating n-
ports?
a) Flogi
b) Fdisc
c) Both a & b
d) None of the mentioned
View Answer
Answer: c
3. Which FC layer is responsible for exchange/frame and sequence management?
a) Layer 0
b) Layer 1
c) Layer 2
d) Layer 4 (ULP)
View Answer
Answer: c
4. Which of the following login is associated with creating an ULP level image pair?
a) Flogi
b) Plogi
c) Prli
d) All of the mentioned
View Answer
Answer: c
5. What is the mechanism used to do flow control between participating N-Ports in a FC communication?
a) B-B Credit mechanism
b) E-E Credit mechanism
c) Both a & b
d) None of the mentioned
View Answer
Answer: c
6. In FCP (FC protocol for SCSI), which of the following phases is not mandatory for read type
commands?
a) Command phase
b) Data phase
c) Transfer ready phase
d) Response phase
View Answer
Answer: c
7. Which of the following is (are) not the responsibility of RSCN service in a fabric?
a) Nodes joining or leaving the fabric
b) Switches joining or leaving the fabric
c) Allocation of fabric IDs
d) All of the mentioned
View Answer
Answer: c
8. Which component of the FC frame header has details about the ULP?
a) Routing Control
b) Class specific control
c) Type field
d) Data field control
View Answer
9. Which of the following enforces access control in SAN/FC switches?
a) Zoning
b) Trunking
c) Flow control
d) Class of service
View Answer
Answer: a
10. What is the significance E-Port?
a) Creates an arbitrated loop
b) Extends the fabric by connecting to other fabrics
c) Represents un-initialized state of a port
d) Represents port with disconnected FC link
View Answer
Answer: b
1. In FC, which of the following are analogous to IP address in data networks?
a) Node WWN
b) Port WWN
c) Fabric address
d) Well known addresses
View Answer
Answer: c
2. Who determines the WWN of FC end point
a) Vendor
b) Fabric controller
c) Node/Loop ports participating in the FC connection
d) None of the mentioned
View Answer
Answer: a
3. Which of the following is the use of trunking?
a) High bandwidth creation between switches
b) Flow control
c) In order delivery
d) Timing service
View Answer
Answer: a
4. Which field of the frame header signifies the presence of optional header?
a) Routing control
b) Data field control
c) Frame control
d) CRC
View Answer
Answer: b
5. Which of the following uniquely identifies an upper layer protocol command within a FC system?
a) Originator exchange id
b) Originator exchange id and source id
c) Receiver exchange id
d) Both (b) & (c)
View Answer
Answer: d